Lesson 10: Assess Endpoint Security Capabilities Flashcards

1
Q

What are essential practices for endpoint hardening?

A

Essential practices include regular updates, secure password policies, least privilege principle, and disabling unnecessary features to reduce the attack surface.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does the principle of least functionality emphasize in Operating Systems (OS) security?

A

Running only required services and protocols.

Using baselines for standardized secure configurations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What strategies are used for workstation hardening?

A

Removing unnecessary software.

Segmenting workstations.

Securing peripheral devices (e.g., USB ports).

Enforcing logging, encryption, endpoint protection, and user education.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are Endpoint Protection strategies?

A

Segmentation: Isolate systems to prevent malware spread.

Isolation: Limit device interactions to reduce lateral movement of threats.

Antivirus and Antimalware: Enhance malware detection and response.

Disk Encryption: Protect data at rest using tools like BitLocker or FileVault.

Patch Management: Use testing environments and enterprise suites like SCCM to apply patches consistently.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are examples of advanced endpoint protection tools, and what do they do?

A

Endpoint Detection and Response (EDR): Real-time threat monitoring and analysis for endpoint devices.

Extended Detection and Response (XDR): Expands EDR to include network, cloud, and other components.

HIDS/HIPS: Monitor for unauthorized access and system anomalies.

User Behavior Analytics (UBA/UEBA): Detect insider threats or compromised accounts based on deviations from baseline behavior.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are endpoint configuration mitigation techniques?

A

Mitigation approaches include addressing social engineering, fixing configuration drift, and applying ACLs for precise access control.

Enforce file system permissions, maintain application allow/block lists, and use continuous monitoring for compliance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What tools enforce configuration adherence?

A

Tools like Group Policy (Windows) and SELinux (Linux/Android) ensure adherence to standardized security settings.

Firewalls benefit from automated enforcement to block unauthorized traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are techniques for physical and logical port hardening?

A

Physical Port Protection: Disable unused ports (USB, HDMI) and warn against attaching unknown devices.

Logical Port Hardening: Employ firewalls and service-specific protections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What encryption practices safeguard data?

A

Full disk encryption (FDE), removable media encryption, and VPNs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are essential practices for mobile device hardening?

A

Encryption, screen locks, secure app configurations, limiting Bluetooth/NFC usage, and centralized device management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the deployment models for mobile devices?

A

BYOD (Bring Your Own Device): Balances flexibility with security risks.

COPE/CYOD (Corporate-Owned Personally Enabled/Choose Your Own Device): Offers more control, while allowing limited personal use.

COBO (Corporate-Owned Business Only): Full enterprise control for business-only devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does Mobile Device Management (MDM) accomplish?

A

Centralizes enforcement of security policies, device tracking, and app management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which platforms are popular for MDM?

A

Popular platforms include Microsoft Intune, VMware AirWatch, and IBM MaaS360.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How does full device encryption protect mobile devices?

A

It safeguards persistent storage and sensitive app data, ensuring comprehensive protection.

iOS and Android support encryption for persistent storage and sensitive app data.

Apply encryption to external media (e.g., SD cards) for comprehensive protection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the connection methods regarding mobile devices?

A

Cellular/GPS Security

Wi-Fi and Tethering

Bluetooth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How can cellular/GPS data be protected?

A

By using VPNs, awareness training, and device encryption.

17
Q

What are the risks associated with Bluetooth usage?

A

Bluejacking and bluesnarfing, which can be mitigated by securing pairing processes and updating firmware.

18
Q

How can you mitigate Wi-Fi and Tethering risks?

A

Avoid open or rogue access points; disable ad hoc networks.

19
Q

What is NFC and what is it used for?

A

Near-Field Communication (NFC)

Commonly used for contactless payments

20
Q

What are NFC vulnerabilities, and how are they mitigated in mobile payments?

A

Vulnerabilities: Susceptible to eavesdropping and skimming attacks.

Mitigation: Mobile wallets like Apple Pay and Google Pay use tokenization and require endpoint safeguards.

21
Q

How does tokenization in mobile payment services improve security?

A

It replaces sensitive data with unique tokens, preventing eavesdropping and skimming attacks.